Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the raster scan monitors
The refresh process must also be performed for raster scan monitors. Most television monitors are raster scan display devices : one scan-line at a time. Raster scan systems uses a memory buffer called frame buffer (or refresh buffer) in which the intensities of the pixels are stored. Refreshing the screen is performed using the information (intensity of each pixel) stored in the frame buffer. Frame buffer can be treated as a two-dimensional array. Raster display devices read the frame buffer and activate the three phosphor dots in the triad according to the value read from the frame buffer.
The entire contents of the frame buffer should be read and the pixels should be activated appropriately at a sufficiently high rate to avoid flickering of the picture. Depending on the persistence of the phosphor coated inside the screen, the monitors require different refresh rates. In some raster display devices, a frame buffer is displayed in two passes. This kind of refreshing is called interlaced. In the first pass the odd rows are refreshed, while the even rows are refreshed in the second pass. Thus, the screen is refreshed in half the time. Though this approach does not really increase the rate of refreshing the screen, but is quite effective in reducing the flicker.
How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to
Define Time Sharing. Time Sharing: Sharing of a computing resource among various users by means of multiprogramming and multi-tasking is termed as timesharing. By permittin
Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a
Q. What is Memory Interleaving? In this scheme main memory is splitted in 'n' equal-size modules and CPU has separate Memory Base register and Memory Address Register for every
Illustrate the following list of consideration of laptop computers The following is a list for consideration: - The processor must consume as little power as possible thus
Determine the features of keyboards Common features on general-purpose keyboards are cursor-control keys. Functions keys are used to enter frequently used operations in a singl
Polymorphism in C++ is the idea that a base class can be inherited by various classes. A base class pointer can point to its child class and a base class array can store dissimilar
Which of the logic gates are known as universal gates ? Ans. NAND and NOR are termed as universal gates, since any digital circuit can be realized completely by using either of
In a DTMF phone, digits are represented by: (A) Orthogonal frequencies. (B) Orthogonal Phases. (C) Orthogonal codes. (D) Orthogonal pulses. Ans: Di
Explain the meaning of CONNECT socket primitive. The connect Primitive: Clients utilize procedure connect to establish connection with an exact server. The form is
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd